Professional Documents
Culture Documents
The Cloud-Enabled
Secure Web Gateway
How Advanced Secure Web Gateways Play a
Critical Security Role in a Cloud-Centric World
Finally, the early SWGs logged and reported on how users connected to
websites. Administrators could monitor and analyze employee interaction
with websites to identify trends, troubleshoot network problems, and react
faster to attacks.
IT teams can deploy the form factor that best fits the location, scale,
and economics of each work environment, while enforcing security and
compliance policies consistently across all sites and benefiting from
centralized visibility, reporting, and management.
Network Endpoint
Threat Intelligence Threat Intelligence
Intellig
al
en
Glob
Email
Forensics
ce
Threat
Tools
Intelligence
Ne
t w ork
SWGs can take advantage of threat data feeds and crowdsourced threat information available on the web.
Comprehensive, up-to-date threat intelligence dramatically increases the effectiveness of today’s advanced SWGs.
Some SWG vendors provide curated policy services. Rather than having to create all policies from scratch,
organizations can choose from a selection of recommended, strong, and maximum policies crafted by security experts.
This not only saves time, it puts policy management in the hands of security experts and reduces the risk of errors and
unintended consequences from imperfectly designed policies.
SWGs can also leverage cloud services for tasks like malware detection and analysis. For example, when an SWG
encounters an unknown file as an email attachment or a web download, it can send the file to a cloud-based service
that uses multiple antimalware engines to test it. If those tests are inconclusive, the file can be executed and monitored
in an isolated sandbox on the cloud to see if it performs malicious actions. These cloud services offload specialized,
processing-intensive tasks from the SWG and return a verdict that allows the SWG to take actions like terminating the
session, quarantining the file, or sending it through to the user. The time needed for this additional testing and analysis
usually is imperceptible to the employee being protected.
• A proxy-based SWG, including advanced authentication and proper handling of SSL/TLS decryption, built upon
Broadcom industry-leading technology in those areas.
• A cloud firewall service, based on advanced NGFW technology that performs deep inspection on network traffic
over all ports and protocols and applies access policies based on applications, user groups, and other factors.
• A CASB that monitors and controls access to and use of cloud applications and helps administrators detect and
block access to shadow IT and other unauthorized applications.
• Web and email isolation that executes and renders web pages and emails in a cloud-based isolation chamber so
ransomware and malware can not be installed or executed on employee endpoints, and so users can not submit
corporate credentials and other sensitive information on suspicious websites.
• DLP that analyzes outbound web, application, and email traffic to prevent sensitive content from leaving your
network.
• Content and malware analysis with sandboxing, to identify known and unknown malware and block zero-day
attacks.
Of course, SWG virtual appliances can also be deployed in data centers when
that is appropriate.
Decryption at Scale
Another essential reason to deploy a properly-sized hardware appliance
in large offices is the need to ensure that all web traffic in both directions
is decrypted and scanned. This is very important, because the volume of
encrypted traffic has been growing rapidly, from half of web traffic at the
beginning of 2014 to about 95% at the end of 2020 (Google Transparency
Report). Decryption can consume a tremendous amount of processing
power. Some cloud-only web security solutions can not handle decryption on
a large scale. This forces administrators to choose between letting encrypted
traffic go through (creating unacceptable security risks) or blocking the
traffic that cannot be decrypted (creating serious user satisfaction issues).
When the same SWG technology can be deployed across data centers,
remote locations, cloud platforms, and hosted services, IT teams only need
to learn and manage one solution. They also benefit from unified visibility
and reporting for security events and data. In addition, the use of a single
underlying solution ensures that security and compliance policies will be
enforced consistently across the entire enterprise.
Flexible Licensing
Some SWG providers also offer flexible licensing. For instance, Broadcom has
made SWG licenses portable between hardware and virtual appliances and
cloud services. If organizations consolidate data centers or move applications
to the cloud, they can protect their investment by moving licenses to
different form factors.
Further, SWGs have evolved to fit into a cloud-centric world, offering new
options for SWG virtual appliances that run in virtual environments and on
cloud platforms and leverage cloud services such as threat intelligence and
cloud-based malware analysis and sandboxing. These same advanced SWG
solutions are also at the core of comprehensive, cloud-based SaaS web
security service offerings.
In short, today’s SWGs enable IT organizations to control the pace of their transition to the cloud without multiplying
tools or sacrificing security.
Websites
Home
Data Centers
Office
On the Go
To see if your SWG solution is delivering the security you need, review the Appendix: Is Your SWG Keeping Pace?
Decryption at Scale
When security tools can not handle the surging level of SSL/TLS encryption (now estimated to be 95% of all web
traffic), they are forced to let some traffic go through without decryption or inspection, creating unacceptable security
risks. An SWG should have the processing power and specialized software and hardware to decrypt 100% of SSL/TLS
traffic for inspection (excluding traffic that must remain encrypted to meet security and privacy regulations).
Broadcom Software is a world leader in business-critical software that modernizes, optimizes, and protects the world’s most
complex hybrid environments. With its engineering-centered culture, Broadcom Software has an extensive portfolio of industry-
leading infrastructure and security software, including AIOps, Cybersecurity, Value Stream Management, DevOps, Mainframe, and
Payment Security. Our software portfolio enables scalability, agility, and security for the largest global companies in the world.
Copyright © 2022 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies.